Static task
static1
Behavioral task
behavioral1
Sample
a1e486d3da2cb559e5274eb7fc83f2530596b95080d7c548c3fbbaae8a4dd8f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a1e486d3da2cb559e5274eb7fc83f2530596b95080d7c548c3fbbaae8a4dd8f4.exe
Resource
win10v2004-20220901-en
General
-
Target
a1e486d3da2cb559e5274eb7fc83f2530596b95080d7c548c3fbbaae8a4dd8f4
-
Size
268KB
-
MD5
3b1240554e5e05eb467fcf42a948a19b
-
SHA1
c062adb46669d9c6ea065384b932105352fef70a
-
SHA256
a1e486d3da2cb559e5274eb7fc83f2530596b95080d7c548c3fbbaae8a4dd8f4
-
SHA512
86f715326de729651d3637f922c64d3e98763b2a8f0e8b4c2fbbdd7aac370cb31738d9f9fe5850f72a6b31345dc41837fe0eab976e9ca6bf5a3d477b9e9f533c
-
SSDEEP
6144:Mivze7WW5ttPO7gDclJoQm5ORhunsZWbMWAUoevQ8xAOx:MYlW5tvAo/5OREnhMWTR
Malware Config
Signatures
Files
-
a1e486d3da2cb559e5274eb7fc83f2530596b95080d7c548c3fbbaae8a4dd8f4.exe windows x86
256461973277121efc09c636ecfa0e52
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GetTimeZoneInformation
GetVersion
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFlags
GlobalFree
GlobalGetAtomNameA
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockFile
LockResource
MulDiv
MultiByteToWideChar
Process32Next
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetErrorMode
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnlockFile
VirtualAlloc
VirtualFree
WideCharToMultiByte
WinExec
WritePrivateProfileStringA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
GetTempPathA
GetStringTypeW
GetStringTypeA
GetStartupInfoA
GetShortPathNameA
GetProcessVersion
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetFileType
GetFileTime
GetFileAttributesA
GetEnvironmentStringsW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushFileBuffers
FindResourceA
FindClose
FileTimeToSystemTime
ExitProcess
EnterCriticalSection
DuplicateHandle
DeleteFileA
DeleteCriticalSection
DebugActiveProcess
CreateFileA
CompareStringW
CompareStringA
CloseHandle
gdi32
TextOutA
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
SetTextColor
SetMapMode
SetBkColor
ScaleWindowExtEx
ScaleViewportExtEx
SaveDC
RestoreDC
RemoveFontResourceA
Rectangle
RectVisible
PtVisible
OffsetViewportOrgEx
LPtoDP
GetWindowExtEx
GetViewportExtEx
GetTextColor
GetStockObject
GetObjectA
GetDeviceCaps
GetClipBox
GetBkColor
ExtTextOutA
ExtCreatePen
Escape
DeleteObject
DeleteDC
DPtoLP
advapi32
RegQueryValueExA
RegCloseKey
RegSetValueExA
LsaGetSystemAccessAccount
RegOpenKeyExA
RegCreateKeyExA
user32
EnableMenuItem
EnableWindow
EndDialog
GetActiveWindow
GetCapture
GetClassInfoA
GetClassLongA
GetClassNameA
GetClientRect
GetCursorPos
GetDC
GetDlgCtrlID
GetDlgItem
GetFocus
GetForegroundWindow
GetKeyState
GetMenu
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMessageA
GetMessagePos
GetNextDlgGroupItem
GetNextDlgTabItem
GetParent
GetPropA
GetSubMenu
GetSysColor
GetSysColorBrush
GetSystemMetrics
GetTopWindow
GetWindow
GetWindowDC
GetWindowLongA
GetWindowPlacement
GetWindowTextA
GrayStringA
IsChild
IsIconic
IsWindow
IsWindowEnabled
LoadBitmapA
DrawTextA
LoadIconA
LoadStringA
MapDialogRect
MapWindowPoints
MessageBeep
MessageBoxA
ModifyMenuA
MoveWindow
OffsetRect
PeekMessageA
PostMessageA
PostQuitMessage
PostThreadMessageA
PtInRect
RedrawWindow
RegisterClassA
RegisterWindowMessageA
ReleaseDC
RemovePropA
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetPropA
SetRect
SetWindowContextHelpId
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowsHookExA
SystemParametersInfoA
TabbedTextOutA
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
ValidateRect
WinHelpA
wsprintfA
DlgDirListComboBoxA
DispatchMessageA
DestroyWindow
DestroyMenu
DefWindowProcA
CreateWindowExA
CallNextHookEx
ClientToScreen
CheckMenuItem
CharUpperA
CharNextA
LoadCursorA
CallWindowProcA
AdjustWindowRectEx
CreateDialogIndirectParamA
oleaut32
VariantCopy
VariantClear
VariantChangeType
VarI4FromR8
VarBstrFromDate
SysStringLen
SysFreeString
SysAllocStringLen
SysAllocStringByteLen
SysAllocString
OleCreateFontIndirect
VariantTimeToSystemTime
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
comdlg32
ChooseFontW
FindTextA
FindTextW
GetFileTitleA
GetFileTitleW
GetOpenFileNameA
PrintDlgExA
dwLBSubclass
ChooseColorA
ChooseColorW
ole32
CoFreeUnusedLibraries
CLSIDFromString
CLSIDFromProgID
CoRevokeClassObject
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
OleFlushClipboard
OleInitialize
OleIsCurrentClipboard
OleUninitialize
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
StringFromCLSID
CoRegisterMessageFilter
CoGetClassObject
comctl32
ord17
oledlg
OleUIBusyW
ord8
Sections
.text Size: 54KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ